Apache cxf saml SubjectConfirmation Security Restriction Bypass Vulnerability
Release date:
Updated on:
Affected Systems:
Apache Group CXF <3.0.2
Apache Group CXF <2.7.13
Description:
Bugtraq id: 70736
CVE (CAN) ID: CVE-2014-3623
Apache CXF is an open-source service framework used to compile and develop services using front-end programming APIs such as JAX-WS and JAX-RS.
When Apache CXF versions earlier than 2.7.13 and Apache CXF versions earlier than 3.0.2 are used together with TransportBinding, The SAML SubjectConfirmation method is not correctly implemented. The security restriction bypass vulnerability exists in implementation, attackers can exploit this vulnerability to bypass certain security restrictions and perform spoofing attacks.
<* Source: Dario amsiri (GE Global Research)
*>
Suggestion:
Vendor patch:
Apache Group
------------
The vendor has released a patch to fix this security problem. Please download it from the vendor's homepage:
Http://svn.apache.org/viewvc? View = revision & revision = 1624308
Http://svn.apache.org/viewvc? View = revision & revision = 1624287
Http://svn.apache.org/viewvc? View = revision & revision = 1624262
Refer:
Http://cxf.apache.org/security-advisories.data/CVE-2014-3623.txt.asc? Version = 1 & modificationDate = 1414169368341 & api = v2
Basic Apache CXF quick start tutorial
Apache CXF practice
For details about Apache CXF, click here
Apache CXF: click here
This article permanently updates the link address: